Analysis
-
max time kernel
184s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:02
Static task
static1
Behavioral task
behavioral1
Sample
957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe
Resource
win10v2004-20221111-en
General
-
Target
957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe
-
Size
522KB
-
MD5
318e0b138fc02a3b25b27d25a107f7e4
-
SHA1
db17f60b25116fd99aa4c63dea2d84b43e8ac54b
-
SHA256
957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2
-
SHA512
0d785f20346671bc44ed19046c007abf6d49b7c969ff73ae58427b634cb576b52166f4a1b04f4c8663eb7952965f33d75cdade9c4f1f6d2ec4516e6b7b652b9c
-
SSDEEP
12288:r/NmduOPYjy6XLiRlqJWh0mpy18xQqpx8O5OC:rF4YjjXLKlGWh0mpatqpx8w
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exedescription pid process target process PID 2944 wrote to memory of 4540 2944 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe PID 2944 wrote to memory of 4540 2944 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe PID 2944 wrote to memory of 4540 2944 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe PID 2944 wrote to memory of 664 2944 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe PID 2944 wrote to memory of 664 2944 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe PID 2944 wrote to memory of 664 2944 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe 957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe"C:\Users\Admin\AppData\Local\Temp\957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exestart2⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\957d0a2c6381d13afa08992fa160930853ac637fb7536c56e8e7ca99e25e63f2.exewatch2⤵PID:664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/664-133-0x0000000000000000-mapping.dmp
-
memory/664-136-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/664-138-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/664-140-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/664-143-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2944-132-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2944-135-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4540-134-0x0000000000000000-mapping.dmp
-
memory/4540-137-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4540-139-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4540-141-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4540-142-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB